CVE-2018-5732
Summary
| CVE | CVE-2018-5732 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-10-09 16:15:00 UTC |
| Updated | 2020-01-09 21:14:00 UTC |
| Description | Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Isc | Dhcp | All | All | All | All |
| Application | Isc | Dhcp | 4.1-esv | - | All | All |
| Application | Isc | Dhcp | 4.1-esv | r1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r10 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r10b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r10rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11rc2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r12 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r12-p1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r12b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r13 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r13b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r14 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r14b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r15 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r4 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5rc2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r6 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r7 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r8 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r8b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r8rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r9 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r9b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r9rc1 | All | All |
| Application | Isc | Dhcp | 4.1.2 | p1 | All | All |
| Application | Isc | Dhcp | 4.4.0 | All | All | All |
| Application | Isc | Dhcp | All | All | All | All |
| Application | Isc | Dhcp | 4.1-esv | - | All | All |
| Application | Isc | Dhcp | 4.1-esv | r1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r10 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r10b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r10rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r11rc2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r12 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r12-p1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r12b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r13 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r13b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r14 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r14b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r15 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r4 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5rc2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r6 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r7 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r8 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r8b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r8rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r9 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r9b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r9rc1 | All | All |
| Application | Isc | Dhcp | 4.1.2 | p1 | All | All |
| Application | Isc | Dhcp | 4.4.0 | All | All | All |
| Application | Isc | Dhcp | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2018-5732: Potential buffer overflow | CONFIRM | kb.isc.org | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: ISC would like to thank Felix Wilhelm, Google Security Team, for reporting this vulnerability.